Securing Embedded Systems in ICS/OT: Strategies to Defend Against Software Supply Chain Risks

Watch on Demand: Securing Embedded Systems in ICS/OT & Defending Against Software Supply Chain Risks

In 2024, 20.3% of ICS/OT leaders reported supply chain compromise as the initial attack vector involved in OT/control systems incidents according to SANS. And with threat actors like Volt Typhoon on the loose, that number will only continue to rise. 

Andy Kling, VP of Cybersecurity at Schneider Electric, and Joe Saunders and Shane Fry from RunSafe Security shared strategies for addressing the software supply chain security challenge in this webinar. 

Download the full webinar to learn about:

  1. The significance of software supply chain risks in ICS/OT and why embedded systems are vulnerable
  2. Strategies for staying ahead of software supply chain vulnerabilities from Schneider Electric
  3. How to future-proof your ICS/OT software by addressing memory safety in the software supply chain

Watch the webinar on-demand and learn what measures you can put in place to address software supply chain risk.

Download our Webinar

What Can RunSafe Security Do For You?

Exclusive Technology

Disrupt Attacker Economics

Remove the structure needed for reliable memory exploitation.

Cyber Bug

Reduce Attack
Surfaces

Neutralize Zero-Days with Moving Target Defense.

Systems Icon

Protect Key
Applications

Proactive Code Level Security to maintain original functionality and mitigate the attack.